IMPORTANT: No additional bug fixes or documentation updates
will be released for this version. For the latest information, see the
current release documentation.
Auditbeat
edit
IMPORTANT: This documentation is no longer updated. Refer to Elastic's version policy and the latest documentation.
Auditbeat
editThese anomaly detection job wizards appear in Kibana if you use Auditbeat to audit process activity on your systems.
- docker_high_count_process_events_ecs
-
-
For Auditbeat data where
event.moduleisauditdandcontainer.runtimeisdocker. -
Models process execution rates (
partition_field_nameiscontainer.name). -
Detects unusual increases in process execution rates in Docker containers
(using the
high_countfunction).
-
For Auditbeat data where
- docker_rare_process_activity_ecs
-
-
For Auditbeat data where
event.moduleisauditdandcontainer.runtimeisdocker. -
Models occurrences of process execution (
partition_field_nameiscontainer.name). -
Detects rare process executions in Docker containers (using the
rarefunction).
-
For Auditbeat data where
- hosts_high_count_process_events_ecs
-
-
For Auditbeat data where
event.moduleisauditd. -
Models process execution rates (
partition_field_nameishost.name). -
Detects unusual increases in process execution rates (using the
high_non_zero_countfunction).
-
For Auditbeat data where
- hosts_rare_process_activity_ecs
-
-
For Auditbeat data where
event.moduleisauditd. -
Models process execution rates (
partition_field_nameishost.name). -
Detects rare process executions on hosts (using the
rarefunction).
-
For Auditbeat data where